Advertisement

Formally Validated Authentication Protocols for WSN

  • Ummer IqbalEmail author
  • Saima Shafi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 750)

Abstract

Authentication is one of the most important cryptographic primitive for safe guarding network entities and data. Data communication within Wireless Sensor Network is primarily limited to Base to node and Node to Base Communication. Methods have been employed to authenticate data transmitted between Node to Base and Base to Node within a WSN. However, such existing methods are primarily based on symmetric cryptography thus providing less flexibility and practicality. Public key cryptography provides flexible and prudent methods for authentication but they are computationally intense making them impractical for WSN. However, ECC and its light weight implementation TinyECC offers high potential for developing computationally efficient security protocols for WSN. In this paper, a brief review of the existing authentication methods in WSN has been presented. Two improved protocols concerning Sink to Reduced Function Device (RFD) and RFD to Sink communication has been presented. The proposed protocol has been formally validated on Avispa. An experimental set up using MicaZ and TinyOS has been created to carry out the performance benchmarking of the proposed protocols.

Keywords

WSN Authentication ECC TinyECC AVISPA TinyOS 

References

  1. 1.
    Sanchez-Rosario, F.: A low consumption real time environmental monitoring system for smart cities based on ZigBee wireless sensor network. IEEE 978-1-4799-5344-8 (2015)Google Scholar
  2. 2.
    Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), pp. 53–57Google Scholar
  3. 3.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)zbMATHGoogle Scholar
  4. 4.
    Menzes, B.: Network Security and Cryptography. Cengage LearningGoogle Scholar
  5. 5.
    Mallan, D.J., Welish, M., Smith, D.M.: Implementing public key infrastructure for sensor networks. Trans. Sens. Netw. 4Google Scholar
  6. 6.
    Gura, N., Patel, A., Wander, A.S., Eberle, H., Chang Shantz, S.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Cryptographic Hardware and Embedded Systems, vol. 3156, pp. 119–132. SpringerGoogle Scholar
  7. 7.
    Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocol for sensor networks. In: Proceedings of 7th International Conference on Mobile Networking And Computing, vol. 8(5), pp 189–199 (2001)Google Scholar
  8. 8.
    Karlof, C., Sastry, N., Wagner, D: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys, Baltimore, MD, USA, 3–5 Nov 2004, pp. 162–175. ACMGoogle Scholar
  9. 9.
    Luk, M., Mezzour, G., Perrig, A., Gligor, V.: MiniSec: a secure sensor network communication architecture. In: Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN ′07) April 200747948810.1145/1236360.12364212-s2.0-3534889734Google Scholar
  10. 10.
    Mohd, A., Aslam, N., Robertson, W., Phillips, W.: C-sec: energy efficient link layer encryption protocol for wireless sensor networks. In: Proceedings of the 9th Consumer Communications and Networking Conference (CCNC ‘12). IEEE, Las Vegas, Nevada USA, pp. 219–223 (2012)Google Scholar
  11. 11.
    AVISPA Web tool.: Automated Validation of Internet Security Protocols and Applications, www.avispa-project.org, Last Accessed Jan 2018
  12. 12.
    Levis, P., Gay, D.: TinyOS Programming. Cambridge University Press (2009)Google Scholar
  13. 13.
    Memsic: Xserve User Manual May (2007)Google Scholar
  14. 14.
    Liu, A., Ning et al., P.: Tiny ECC: a configurable library for elliptical curve cryptography in wireless sensor networks. In: 7th International Conference on Information Processing in Sensor Networks SPOTS Track, April 2008Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.National Institute of Electronics and Information TechnologySrinagarIndia
  2. 2.Shri Sukhmani Institute of Engineering and TechnologyChandigarhIndia

Personalised recommendations